<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone-base Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-base-firewall/m-p/1552136#M623129</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey George,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To view the sessions being created, use the command "show policy-map type inspect zone-pair NAME sessions". Replace NAME with the name of the corresponding zone-pairs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To enable logging of dropped packets by zone based firewall, use the command "ip inspect log drop-pkt". You should then be able to see syslogs of dropped packets (along with details of zone-pair and class-map being hit).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 10 Oct 2010 11:53:49 GMT</pubDate>
    <dc:creator>praprama</dc:creator>
    <dc:date>2010-10-10T11:53:49Z</dc:date>
    <item>
      <title>Zone-base Firewall</title>
      <link>https://community.cisco.com/t5/network-security/zone-base-firewall/m-p/1552135#M623118</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have been doing some ZBF configuration on 2811 router with IOS version "advsecurityk9-mz.124-15.T10"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i configured a zone-pair from inside to outside with its policy-map and class-map (for the traffic that are initiated from inside),&lt;/P&gt;&lt;P&gt;the flow is 90% form inside to outside. i also configured zone-pair from outside to inside for the other 10% opposite traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the problem is that some traffic are being stopped from inside to outside, and i am not able to track it or log it somehow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my class-map is based on access-list (very long one). since i cannot log a line in an access-list, for example: deny ip any any &lt;SPAN style="text-decoration: underline;"&gt;log&lt;/SPAN&gt; (not permitted)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i tried:&lt;/P&gt;&lt;P&gt;1- "show ip inspect session" but i cannot see any output (i read that it is for CBAC)&lt;/P&gt;&lt;P&gt;2-&amp;nbsp; "show policy-map type inspect zone-pair" displays some counter for established session&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The question is, how i can see the sessions and what is being blocked?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...............................&lt;/P&gt;&lt;P&gt;class-map type inspect match-any c2&lt;BR /&gt; match access-group name fromOut&lt;BR /&gt;class-map type inspect match-any c1&lt;BR /&gt; match access-group name fromIn&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect fromIn&lt;/P&gt;&lt;P&gt; class type inspect c1&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;policy-map type inspect fromout&lt;BR /&gt; class type inspect c2&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank and Regards,&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:52:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-base-firewall/m-p/1552135#M623118</guid>
      <dc:creator>gaboughanem</dc:creator>
      <dc:date>2019-03-11T18:52:37Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-base Firewall</title>
      <link>https://community.cisco.com/t5/network-security/zone-base-firewall/m-p/1552136#M623129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey George,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To view the sessions being created, use the command "show policy-map type inspect zone-pair NAME sessions". Replace NAME with the name of the corresponding zone-pairs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To enable logging of dropped packets by zone based firewall, use the command "ip inspect log drop-pkt". You should then be able to see syslogs of dropped packets (along with details of zone-pair and class-map being hit).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Oct 2010 11:53:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-base-firewall/m-p/1552136#M623129</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-10T11:53:49Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-base Firewall</title>
      <link>https://community.cisco.com/t5/network-security/zone-base-firewall/m-p/1552137#M623146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;edited as the answer is above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Oct 2010 21:17:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-base-firewall/m-p/1552137#M623146</guid>
      <dc:creator>golly_wog</dc:creator>
      <dc:date>2010-10-11T21:17:50Z</dc:date>
    </item>
  </channel>
</rss>

